Jonas Juffinger

Orcid: 0009-0002-0569-1704

According to our database1, Jonas Juffinger authored at least 18 papers between 2018 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
KernelSnitch: Side Channel-Attacks on Kernel Data Structures.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

Secret Spilling Drive: Leaking User Behavior through SSD Contention.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

Real-World Study of the Security of Educational Test Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2025

The HMB Timing Side Channel: Exploiting the SSD's Host Memory Buffer.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2025

Not So Secure TSC.
Proceedings of the Applied Cryptography and Network Security, 2025

Fast and Efficient Secure L1 Caches for SMT.
Proceedings of the Availability, Reliability and Security - 20th International Conference, 2025

2024
Power, Energy, and Carbon-Aware Computing on Heterogeneous Systems (PEACHES) (Dagstuhl Seminar 24351).
Dagstuhl Reports, 2024

SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript.
Proceedings of the 33rd USENIX Security Symposium, 2024

IdleLeak: Exploiting Idle State Side Effects for Information Leakage.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Remote Scheduler Contention Attacks.
Proceedings of the Financial Cryptography and Data Security, 2024

Presshammer: Rowhammer and Rowpress Without Physical Address Information.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

SUIT: Secure Undervolting with Instruction Traps.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels.
Proceedings of the 32nd USENIX Security Symposium, 2023

CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

SQUIP: Exploiting the Scheduler Queue Contention Side Channel.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Half-Double: Hammering From the Next Row Over.
Proceedings of the 31st USENIX Security Symposium, 2022

2018
Another Flip in the Wall of Rowhammer Defenses.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018


  Loading...